必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
IP 类型 评论内容 时间
119.139.196.35 attack
Unauthorized connection attempt from IP address 119.139.196.35 on Port 445(SMB)
2020-08-09 20:46:39
119.139.196.20 attackbotsspam
May 12 22:34:33 h2040555 sshd[10425]: Invalid user buster from 119.139.196.20
May 12 22:34:33 h2040555 sshd[10425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.196.20 
May 12 22:34:35 h2040555 sshd[10425]: Failed password for invalid user buster from 119.139.196.20 port 46180 ssh2
May 12 22:34:35 h2040555 sshd[10425]: Received disconnect from 119.139.196.20: 11: Bye Bye [preauth]
May 12 22:45:09 h2040555 sshd[10583]: Invalid user fj from 119.139.196.20
May 12 22:45:09 h2040555 sshd[10583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.196.20 
May 12 22:45:11 h2040555 sshd[10583]: Failed password for invalid user fj from 119.139.196.20 port 38991 ssh2
May 12 22:45:11 h2040555 sshd[10583]: Received disconnect from 119.139.196.20: 11: Bye Bye [preauth]
May 12 22:50:18 h2040555 sshd[10594]: Invalid user ftpuser from 119.139.196.20
May 12 22:50:18 h2040555 sshd[10594]: pam_u........
-------------------------------
2020-05-14 07:32:25
119.139.196.143 attackbots
Lines containing failures of 119.139.196.143
Apr 15 14:05:09 shared11 sshd[5506]: Invalid user support from 119.139.196.143 port 49208
Apr 15 14:05:09 shared11 sshd[5506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.196.143
Apr 15 14:05:11 shared11 sshd[5506]: Failed password for invalid user support from 119.139.196.143 port 49208 ssh2
Apr 15 14:05:12 shared11 sshd[5506]: Received disconnect from 119.139.196.143 port 49208:11: Bye Bye [preauth]
Apr 15 14:05:12 shared11 sshd[5506]: Disconnected from invalid user support 119.139.196.143 port 49208 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=119.139.196.143
2020-04-16 03:15:42
119.139.196.79 attack
Apr  9 06:12:14 mailserver sshd\[5934\]: Invalid user panshan from 119.139.196.79
...
2020-04-09 20:15:40
119.139.196.99 attackspambots
Unauthorized connection attempt detected from IP address 119.139.196.99 to port 1433 [J]
2020-01-15 23:56:11
119.139.196.163 attackbotsspam
Unauthorized connection attempt from IP address 119.139.196.163 on Port 445(SMB)
2020-01-14 04:14:30
119.139.196.148 attackbotsspam
Fail2Ban Ban Triggered (2)
2020-01-13 15:02:41
119.139.196.67 attackbotsspam
Unauthorized connection attempt detected from IP address 119.139.196.67 to port 445
2020-01-02 19:19:16
119.139.196.69 attackspambots
3389BruteforceFW21
2019-11-10 08:41:21
119.139.196.223 attackbots
Aug 18 14:15:56 h2034429 sshd[9200]: Invalid user bess from 119.139.196.223
Aug 18 14:15:56 h2034429 sshd[9200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.196.223
Aug 18 14:15:58 h2034429 sshd[9200]: Failed password for invalid user bess from 119.139.196.223 port 38154 ssh2
Aug 18 14:15:58 h2034429 sshd[9200]: Received disconnect from 119.139.196.223 port 38154:11: Bye Bye [preauth]
Aug 18 14:15:58 h2034429 sshd[9200]: Disconnected from 119.139.196.223 port 38154 [preauth]
Aug 18 14:47:36 h2034429 sshd[9654]: Invalid user tzhang from 119.139.196.223
Aug 18 14:47:36 h2034429 sshd[9654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.196.223
Aug 18 14:47:38 h2034429 sshd[9654]: Failed password for invalid user tzhang from 119.139.196.223 port 33836 ssh2
Aug 18 14:47:38 h2034429 sshd[9654]: Received disconnect from 119.139.196.223 port 33836:11: Bye Bye [preauth]
Aug 18 1........
-------------------------------
2019-08-19 03:05:47
119.139.196.108 attack
Aug 14 19:53:58 vps647732 sshd[32675]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.139.196.108
Aug 14 19:54:00 vps647732 sshd[32675]: Failed password for invalid user ricky from 119.139.196.108 port 39906 ssh2
...
2019-08-15 05:51:22
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 119.139.196.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38190
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;119.139.196.7.			IN	A

;; AUTHORITY SECTION:
.			265	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030800 1800 900 604800 86400

;; Query time: 72 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 08 18:03:43 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 7.196.139.119.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.196.139.119.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
222.186.52.124 attackbotsspam
Aug 12 13:13:22 ubuntu-2gb-nbg1-dc3-1 sshd[31742]: Failed password for root from 222.186.52.124 port 35496 ssh2
Aug 12 13:13:25 ubuntu-2gb-nbg1-dc3-1 sshd[31742]: Failed password for root from 222.186.52.124 port 35496 ssh2
...
2019-08-12 19:57:41
23.129.64.151 attackbotsspam
Aug 12 13:44:37 ns41 sshd[30855]: Failed password for root from 23.129.64.151 port 25824 ssh2
Aug 12 13:44:39 ns41 sshd[30855]: Failed password for root from 23.129.64.151 port 25824 ssh2
Aug 12 13:44:43 ns41 sshd[30855]: Failed password for root from 23.129.64.151 port 25824 ssh2
Aug 12 13:44:46 ns41 sshd[30855]: Failed password for root from 23.129.64.151 port 25824 ssh2
2019-08-12 20:12:14
85.105.176.2 attack
port scan and connect, tcp 23 (telnet)
2019-08-12 20:34:47
119.149.141.191 attackbotsspam
2019-08-12T02:26:30.893842abusebot-7.cloudsearch.cf sshd\[25657\]: Invalid user shante from 119.149.141.191 port 37284
2019-08-12 20:13:15
212.179.229.245 attackspam
Automatic report - Port Scan Attack
2019-08-12 20:23:41
180.76.196.179 attackspambots
Aug 12 13:53:58 master sshd[27142]: Failed password for invalid user hadoop from 180.76.196.179 port 35560 ssh2
2019-08-12 20:10:29
183.6.176.182 attackbotsspam
Aug 12 12:04:40 rpi sshd[10749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.6.176.182 
Aug 12 12:04:42 rpi sshd[10749]: Failed password for invalid user ftp from 183.6.176.182 port 36517 ssh2
2019-08-12 19:52:10
46.3.96.69 attackbots
08/12/2019-08:38:57.948492 46.3.96.69 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 47
2019-08-12 20:40:12
89.216.109.9 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-12 20:36:12
192.160.102.170 attackspambots
Aug 12 11:59:35 v22018076622670303 sshd\[25115\]: Invalid user user1 from 192.160.102.170 port 43263
Aug 12 11:59:35 v22018076622670303 sshd\[25115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.160.102.170
Aug 12 11:59:38 v22018076622670303 sshd\[25115\]: Failed password for invalid user user1 from 192.160.102.170 port 43263 ssh2
...
2019-08-12 20:17:07
79.16.103.135 attack
vps1:sshd-InvalidUser
2019-08-12 19:50:45
217.112.128.132 attackspam
Aug 12 02:03:20 srv1 postfix/smtpd[6146]: connect from ship.beautisleeprh.com[217.112.128.132]
Aug x@x
Aug 12 02:03:27 srv1 postfix/smtpd[6146]: disconnect from ship.beautisleeprh.com[217.112.128.132]
Aug 12 02:03:47 srv1 postfix/smtpd[6146]: connect from ship.beautisleeprh.com[217.112.128.132]
Aug 12 02:03:52 srv1 postfix/smtpd[3500]: connect from ship.beautisleeprh.com[217.112.128.132]
Aug x@x
Aug 12 02:03:52 srv1 postfix/smtpd[6146]: disconnect from ship.beautisleeprh.com[217.112.128.132]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=217.112.128.132
2019-08-12 20:06:09
122.155.223.113 attack
Aug 12 11:34:58 shadeyouvpn sshd[5611]: Invalid user usuario from 122.155.223.113
Aug 12 11:34:58 shadeyouvpn sshd[5611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.223.113 
Aug 12 11:35:01 shadeyouvpn sshd[5611]: Failed password for invalid user usuario from 122.155.223.113 port 60404 ssh2
Aug 12 11:35:01 shadeyouvpn sshd[5611]: Received disconnect from 122.155.223.113: 11: Bye Bye [preauth]
Aug 12 11:43:50 shadeyouvpn sshd[13798]: Invalid user SinusBot from 122.155.223.113
Aug 12 11:43:50 shadeyouvpn sshd[13798]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.223.113 
Aug 12 11:43:52 shadeyouvpn sshd[13798]: Failed password for invalid user SinusBot from 122.155.223.113 port 33296 ssh2
Aug 12 11:43:52 shadeyouvpn sshd[13798]: Received disconnect from 122.155.223.113: 11: Bye Bye [preauth]
Aug 12 11:44:55 shadeyouvpn sshd[14291]: Invalid user angelina from 122.155.223.........
-------------------------------
2019-08-12 20:35:26
68.183.203.23 attack
Invalid user fake from 68.183.203.23 port 59472
2019-08-12 20:01:43
94.191.60.199 attack
Aug 12 11:10:08 XXX sshd[62409]: Invalid user sam from 94.191.60.199 port 35290
2019-08-12 20:05:46

最近上报的IP列表

119.139.196.51 119.139.196.28 119.139.197.128 119.139.197.141
119.139.197.142 119.139.197.153 119.139.196.98 119.139.197.16
119.139.197.163 119.139.197.204 119.139.197.210 119.139.197.225
119.139.197.238 119.139.197.251 119.139.197.231 116.72.200.148
119.139.197.44 119.139.197.97 119.139.197.49 119.139.197.247